Information Technology, Sample Thesis Papers

Using Finger to Enumerate nix Systems

The following is an example of how to use the Finger command on remote as well as local *nix systems for enumeration. This is a powerful command that can be used to collect info from a remote system. Boot the system into Linux with the help of the resourceful BackTrack DVD, and Enter “startx” at the provided command prompt. Open the Konsole shell and Enter “man finger” in the shell. Go throught the manual. The spacebar can be used for scrolling through the document. Continue reading “Using Finger to Enumerate nix Systems”

Information Technology, Sample Thesis Papers

Using Built-in Windows NetBIOS Tools

Before using professionally designed NetBIOS tools, it is wise for security testers to get to know how to use the ones that are built-in as part of the Windows Operating System (OS). Some such tools are the Net view, Nbtstat, and Net use commands. It is better to have a teammate work with you while practising these tools for viewing NetBIOS shares and services. Continue reading “Using Built-in Windows NetBIOS Tools”

Information Technology

Using Additional Nmap Commands

There are many variations and many new and different commands that can be used for port scanning on networks that are to be attacked. There are many other options and parameters for doing things like sending FIN, ACK, and XMAS packet at specified selected ports. These commands should be practised by security testers until they are second nature. Continue reading “Using Additional Nmap Commands”